True Names Paper

True Names Paper - 1 Ty Taborn CMSC102 Section: 0201 ID...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Ty Taborn CMSC102 Section: 0201 ID #: 108824539 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Question #1: There are many reasons why people find it important to use cryptographic techniques. According to the True Nyms and Crypto essay some of these reasons include, “ privacy, fear of reprisal by employees or other groups, avoidance of profiles of their activities and interest, posting to controversial newsgroups or support groups (such as ‘alt.recovery’ or rapes and incest recovery groups) whistleblowing [sic], and floating of a controversial ideas.”(May, 39) Eric Hughes and Hal Finney were the first Cypherpunks to write the code for remailers, they wrote the code using Perl and C programming languages. Remailers are an effective way to hide the identity of someone who is sending an email. The way a remailer works according to pcmag.com is by, “forward[ing] e-mail anonymously stripping out the sender's name and e-mail address”. Pcmag.com goes on to compare using a remailer to dropping a letter in a postal service mailbox with out including a return address. Eric Hughes being a Cyberpunk, believed that he was making the world a better places by embracing and widely using cryptographic techniques. His vision seems to be very noble considering the reasons listed above for using remailers, but it also seems very irresponsible because the technology could be used to do criminal things. For example the essay says that the remailers were used to, “ publish the secrets of the Church of Scientology, to disclose military secrets, and, not surprisingly, for flames, insults, and anonymous attacks”(May, 41). Because there was no way to trace the emails court-orders and lawsuits were, “ineffective in revealing the identities of those sending the mail.”(May, 41) 2
Background image of page 2
3 Another remailing system was set up by a guy names Julf Helsigus. Unfortunately for him is system kept the information that linked the actually email address of the send and the pseudonyms. Because this record existed, it was the target of many court orders and lawsuits. Eventually Julf had to shut down his system. One tool that I have used and I think is commonly used is public web proxies. Public web
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/20/2008 for the course CMSC 102 taught by Professor Golub during the Fall '07 term at Maryland.

Page1 / 7

True Names Paper - 1 Ty Taborn CMSC102 Section: 0201 ID...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online